Publications
"Tool support for UML-based specification and verification of role-based access control properties",
8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2011.
Abstract
The UML profile and example described in this paper can be downloaded from the Related URL given below. Pages: 456-459 ISBN: 978-1-4503-0443-6
"From Goal-Driven Security Requirements Engineering to Secure Design",
International Journal of Intelligent Systems, vol. 25, issue 8, 2010.
"Verifying FreeRTOS: from requirements to binary code",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11), vol. CS-TR-1272, 2011.
Short paper
A Quick Tour of the VeriFast Program Verifier,
, 2011.
Talk at a Departmental Seminar of the School of Computing, Newcastle University, UK.
Combining Formal Methods and Testing: A Case Study on FreeRTOS,
, 2011.
Invited talk at the 10th International Conference on Software QA and Testing on Embedded Systems (QA&Test 2011), Bilbao, Spain.
"Algorithms for Security-by-Contract on Multi-Application Java Cards",
Journal of Critical Computer-Based Systems, 2011.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
Journal of Secure Software Engineering, vol. 1, issue 1, pp. 54--73, 2009.
"Security Requirements Engineering for Evolving Software Systems: A Survey",
IJSSE, vol. 1, no. 1, pp. 54-73, 2010.
"Securing the Skies: In Requirements We Trust.",
IEEE Computer, vol. 42, no. 9, pp. 64-72, 2009.
"Java Card Architecture for Autonomous yet Secure Evolution of Smart Cards Applications",
Nordsec 2010 Conference Program, Aalto University, Espoo, Finland, 10/2010.
"A Sound Decision Procedure for the Compositionality of Secrecy",
4th International Symposium on Engineering Secure Software and Systems (ESSOS 2012): Springer, 2012.
"Evaluation of experiences from applying the PREDIQT method in an industrial case study",
Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
"Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study",
SINTEF report: SINTEF, 01/2011.
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web , vol. Volume 5 , issue Issue 3, 07/2011 .
"ACConv-An access control model for conversational Web services",
ACM Transactions on the Web, vol. Vol. x, No. y,, 01/2011.
"Analyzing evolution of variability in a software product line: From contexts and requirements to features",
Information and Software Technology, vol. 53, no. 7, pp. 707 - 721, 2011.
Abstract
"Sound Formal Verification of Linux's USB BP Keyboard Driver",
The 4th NASA Formal Methods Symposium (NFM 2012), 2012.
to appear
"The Belgian electronic identity card: a verification case study",
Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.
Newcastle (UK), 12-14 September 2011, to appear
"Automated UML models merging for web services testing",
Journal on Web and Grid Services, vol. 5, issue 2, pp. 107--129, 2009.
"Synchronization of abstract and concrete syntax in domain-specific modeling languages",
Software and Systems Modeling, vol. 9, pp. 453-471, 2010.
Abstract
"Change-driven Model Transformations",
Proc. of MODELS'09, ACM/IEEE 12th International Conference On Model Driven Engineering Languages and Systems, vol. 5795/2009, pp. 342-356, 2009.
Abstract
UMLsec4UML2 - Adopting UMLsec to Support UML2,
, 02/2011.